Kerneloops

Similar reports
Problem #533278
Component
kernel Tainted
Last affected version
0:5.8.15-301.fc33
Executable
unknown
First occurrence
2024-12-11
Last occurrence
2024-12-11
Unique reports
1
Quality
-20

Statistics

Operating system Unique / Total count
Fedora 33 1 / 1
Operating system Count
Fedora 33 1
Architecture Count
x86_64 1
Related packages Count
kernel-core 1
 0:5.8.15-301.fc33 1

Packages names with count less than the total count of reports are most probably not the cause of the problem.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.


Backtrace

Frame # Function Binary Source or offset Line
1
ktime_get
vmlinux 0x38
2
ktime_get
vmlinux 0x38
3
? ktime_get
vmlinux 0x38
4
dev_write
my_char_device 0x25
5
ktime_get
vmlinux 0x38
6
ktime_get
vmlinux 0x38
7
ktime_get
vmlinux 0x38
8
ktime_get
vmlinux 0x38
BUG: unable to handle page fault for address: 000055cf5b410100
#PF: supervisor read access in kernel mode
#PF: error_code(0x0001) - permissions violation
PGD 8000000032034067 P4D 8000000032034067 PUD 2edef067 PMD 20ce2067 PTE 8000000040f3d867
Oops: 0001 [#4] SMP PTI
CPU: 0 PID: 104484 Comm: bash Tainted: G      D    OE     5.8.15-301.fc33.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/22/2020
RIP: 0010:string+0x49/0xd0
Code: ff 77 36 45 89 d1 31 f6 49 01 f9 66 45 85 d2 75 19 eb 1e 49 39 f8 76 02 88 07 48 83 c7 01 83 c6 01 48 83 c2 01 4c 39 cf 74 07 <0f> b6 02 84 c0 75 e2 4c 89 c2 e9 88 ee ff ff 48 c7 c0 38 3b 40 84
RSP: 0018:ffffa0c441efbe18 EFLAGS: 00010286
RAX: 000055cf5b40f100 RBX: ffffa0c441efbe70 RCX: ffff0a00ffffff04
RDX: 000055cf5b410100 RSI: 0000000000000000 RDI: ffffffffc0860520
RBP: ffffffffc0860520 R08: ffffffffc0860620 R09: 00000000c086051f
R10: ffffffffffffffff R11: 0000000000000000 R12: ffffffffc0860620
R13: ffffffffc085f3d6 R14: 0000000000000100 R15: ffffffffc085f3d6
FS:  00007fc2dcd18740(0000) GS:ffff8aca7be00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055cf5b410100 CR3: 0000000032370001 CR4: 00000000003606f0
Call Trace:
 vsnprintf+0x253/0x4e0
 snprintf+0x39/0x40
 ? security_file_permission+0x2e/0x160
 dev_write+0x25/0x50 [my_char_device]
 vfs_write+0xc7/0x1f0
 ksys_write+0x4f/0xc0
 do_syscall_64+0x4d/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7fc2dce0ce87
Code: 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 48 89 54 24 18 48 89 74 24
RSP: 002b:00007fffbd13c098 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 000000000000000f RCX: 00007fc2dce0ce87
RDX: 000000000000000f RSI: 000055cf5b410100 RDI: 0000000000000001
RBP: 000055cf5b410100 R08: 000000000000000a R09: 00007fc2dcea40c0
R10: 00007fc2dcea3fc0 R11: 0000000000000246 R12: 000000000000000f
R13: 00007fc2dcee0520 R14: 000000000000000f R15: 00007fc2dcee0720
Modules linked in: my_char_device(OE) uinput nls_utf8 isofs rfcomm ip_set nfnetlink snd_seq_midi snd_seq_midi_event bnep btusb btrtl btbcm btintel bluetooth snd_ens1371 intel_rapl_msr vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock snd_ac97_codec intel_rapl_common sunrpc rapl gameport ac97_bus vmw_balloon snd_rawmidi snd_seq snd_seq_device snd_pcm ecdh_generic rfkill ecc joydev pcspkr snd_timer snd soundcore vmw_vmci i2c_piix4 zram vmwgfx drm_kms_helper cec ttm crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel drm mptspi serio_raw scsi_transport_spi mptscsih e1000 mptbase ata_generic pata_acpi fuse [last unloaded: my_char_device]
CR2: 000055cf5b410100